Venezuela, US, CIA and Security ?
We received incredible and massive hacking threats during the past months, their significant reasons and that I`m NOT the FIRST & LAST PERSON for that dirty business.
Concerning my former father in law, Mr. ARA, as known, the canceller from Venezuela, I had published the untruth of a international document regarding his real daughter, my ex wife and now Ministra Consejero LCG, Encargada de Negocios ad interim de la Embajada de la República Bolivariana de Venezuela en la República Federal de Alemania.
That unpleasure press and internet reports had rising incredible hacking, sabotage attacks communications blockings against me, our PC`s and Laptops and as well in other LANS whereever I go. The most of the time in China, Thailand and Malaysia and few times in Germany.
The facts that the data abuse and security government authorities are involved in China, Malaysia, Thailand and Germany in the subjects and employ their own investigations with always delivered subsequently data is already and several times mentioned and published.
As we explained to other IT institutions (we are only small fishes in the big ocean – BUT the Asian Government will NOT allow any kind of security access or threats, impacts and sabotages): the Chinese, Malaysian and Thai security and data abuse Government investigating and working for the same point as we did – so that they match their IP and IT data results against ours from the past six months – to pull the tie thither and tighter around the responsible persons and wire puller.
We informed as well that actions on international levels will initiate to claim/sue our damages in time and material of US$ K30.
As to see - their filthy hacking results and all aspects of negative reputation trigger spraying all over the continents and are published in Mandarin for more then 250 Million magazine, Internet and other readers. Furthermore in Bahasa, Thai, German and Spanish for the other continents.
Perhaps there is now a much better imagination concerning the dimension of that dirty hacking attacks, sabotage and intentional communication blockings which hits not only machines – there are humans, kids and families behind them. The responsibility and consequences are to bear from the persons/institutions and their wire pullers which we knowing since some weeks.
Those persons will NEVER more hacking or attack any other IT users. We pulling the loop closer and closer around and about them AND we want our invested time and damages of US$ 30K back again.
Furthermore computer hacking, damages and much more is a international crime – NOT a cyber game. There are not only machine behind that attacks – there are humans, people, families and kids. Responsibility equal ZERO.
Using the head for PATRIOT thinking of their South American homeland, doing crime acts for that and have the head to cut the hair. Nothing about other meanings, free way of opinion with real facts and….. what you know much better then I.
Read e.g. the article and look at your selves to the impressive pictures under the Bolivian background of the Canadian journalist, with the absolutely identical what we received and they did with us.
substancial links :
http://www.dk3qv.de/spanish.html
http://www.dk3qv.de/hacking-english.html
http://www.dk3qv.de/internet-log-1.html
Asscoiated links :
http://www.opendemocracy.net/forums/thread.jspa?forumID=87&threadID=46305&start=30&tstart=0
http://www.vheadline.com/readnews.asp?id=47155
http://www.williambowles.info/venezuela/2005/raging_bull.html
http://www.vheadline.com/readnews.asp?id=17529
http://lists.grok.org.uk/pipermail/full-disclosure/2003-January/003259.html
http://www.crime-research.org/news/2003/05/Mess0604.html
http://youwillanyway.blogspot.com/2004_06_13_youwillanyway_archive.html
http://web2news.ac-versailles.fr/tree.php?group_name=soc_culture_chile&begin=0
http://mailgate.supereva.com/soc/soc.culture.chile/msg56328.html
Examples of firewall recorded IP addresses - thousands with the same IP-Address
- 66.35.229.209 – 2005/10/14 - 17:56:07 - Pings and more
- 213.244.183.210 – 2005/10/22 - 17:56:31 - Amsterdam – NL – Broomfied Col. – USA – firewall blocked !
- 213.244.183.210 - 2005/11/04 - 12:04:31 - Pings – Amsterdam – NL
- 203.147.56.231 (232) – Dec. 2005/Jan. 2006 - eur.a1.yimg.com/us.i1.yimg.com – known IP
- 169.254.146.146 - 2005-12-25 10:50:45 - 2005-12-25 10:51:59 - 2005-12-25 10:53:32 - 2005-12-25 10:53:38 – firewall attacks/blocking - FTP blocking – Trojan threats
- 61.19.15.213 - 2005-12-25 10:53:15 - firewall attacks and blocking – CAT Thailand - Flag Telecom
- 139.130.97.62 - 2005-12-25 10:53:32 - 2005-12-25 10:53:38 - firewall attacks and blocking – Telstra.net
- 68.86.119.34 - 2006-01-04 10:35:15 - 2006-01-04 16:19:05 - 2006-01-06 12:12:08 - 2006-01-06 12:13:55 2006-01-07 15:55:31 - 2006-01-08 17:50:30 – firewall attacks and blocking – Comcast.net - Chicago
- 68.86.119.34 – 31-1-2006 – Comcast.net - Firewall alert and blocked !
- level3, non-level3 – several times - 30-1-2006
- 203.147.56.231 (232) - eur.a1.yimg.com - us.i1. NL, DL - 1-2-2006 - 9.08.01 – POP3/SMTP !
- 203.147.56.232 – eur.a1.yimg.com - us.i1. NL, DL - 8-2-2006 - 14.26.03 – POP3/SMTP !
- unknown.level3 – 10-2-2006 - 14.43.15
- 210.147.56.231 (232) – eur.a1.yimg.com - us.i1.yimg.com - 22-2-2006 - 9.14.23 – POP3/SMTP !
- 210.147.56.231 (232) - eur.a1.yimg.com - us.i1. – 1-2-2006 - 9.08.01 – POP3/SMTP !
- 203.147.56.232 – 25-2-2006 - 9.13.55 – POP3/SMTP !
- 203.147.56.232 – 28-2-2006 - 16.56.05 – POP3/SMTP !
- 203.147.56.231 (232) - 2-2-2006 at 10.08.23 – POP3/SMTP !
- 203.147.56.230 – 10-3-2006 – 11.18.53 and 19.29.32 – PORT 3232/3151
- 203.147.56.231 - 13-3-2006 – 12.39.01 – eur.a1.yimg.com - us.i1.yimg.com – 50 times blocked !
- further as 203.147.230 (231), (232) with observations and blockings !
- 203.147.56.230 - 2-4-2006 – 9.57.36 – blocked !
- 100 times and further more…………………
- 203.147.56.230 – 11-4-2006 – 17.15.22 - blocked
Follow during observing, hacking and others. Time stamps UTC plus 7 hours.
0 comentarios